Author of the publication

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services.

, , , and . SCC, page 27-34. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security., , , and . TrustCom, page 284-291. IEEE Computer Society, (2014)Blended Identity: Pervasive IdM for Continuous Authentication., , , , and . IEEE Security & Privacy, 13 (3): 32-39 (2015)Self-service Privacy: User-Centric Privacy for Network-Centric Identity., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 17-31. Springer, (2010)Security Management Architecture for NFV/SDN-Aware IoT Systems., , , , , , , , and . IEEE Internet of Things Journal, 6 (5): 8005-8020 (2019)Threat Modeling the Cloud: An Ontology Based Approach., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 61-72. Springer, (2018)Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 27-38. Springer, (2018)Identifying and Utilizing Dependencies Across Cloud Security Services., , , , and . AsiaCCS, page 329-340. ACM, (2016)deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services., , , and . SCC, page 27-34. IEEE Computer Society, (2017)SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats., , , , and . Trustcom/BigDataSE/ISPA, page 465-472. IEEE, (2016)User-Driven Service Lifecycle Management - Adopting Internet Paradigms in Telecom Services., , , , , , and . ICSOC, volume 4749 of Lecture Notes in Computer Science, page 342-352. Springer, (2007)